XCodeGhost Found Hiding In U.S. And In Apple iOS 9 Apps

XCodeGhost -- malware that snuck Trojanized iOS apps into the official App Store -- mostly threatened iOS users in China, but now researchers at FireEye have also found XCodeGhost-infected apps hitting targets in the United States. They also unearthed a stealthier variant, XCodeGhost S, that has weaponized iOS 9 apps and can bypass static detection.

XCodeGhost, first discovered in September, was the first malware to show that non-jailbroken iOS devices could be compromised. Attackers created a malicious version of Apple's application development software, Xcode, and uploaded it to Chinese cloud storage service Baidu Yunpan -- a regional, third-party alternative to the Apple Store where download times are shorter for iOS and Mac developers in China. Then, innocent app developers used XcodeGhost to write apps and upload them to the official App Store, never knowing that those apps were malicious -- over 4,000 apps in all.

Apple removed the compromised apps from the App Store. The command-and-control servers were taken offline -- apparently voluntarily by the malware authors -- but they could be hijacked by other threat actors, and researchers since have found that XCodeGhost is still in action.

Since most of the affected app developers were in China, most of the 4,000 infected apps were those popular in China, yet some are also "fairly popular" in the U.S. and have compromised American users, says Raymond Wei, FireEye's senior director of mobile development.

In a four-week period, FireEye found 210 U.S. enterprises with infected apps, generating over 28,000 attempts to connect to command-and-control servers. The machines currently infected are mostly calling back to servers located in Germany (62%) and the U.S. (33%).

"The main point," say Wei, "is that what was originally a threat in China is no longer just in China."

In their investigation, FireEye also unearthed another variant, XCodeGhost S, which has been updated to Trojanize apps for iOS 9.

The variant was in operation at the same time as the original XCodeGhost, and Wei says the same malware authors were responsible for creating it, even if they aren't responsible for its most recent activity.

Sep. 19, two days after the original XCodeGhost began attracting attention in China, someone claiming responsibility for it tweeted an apology, using the account @XcodeGhost-Author, saying it was just a coding experiment to explore the potential exploitation of a loophole in Xcode to enable advertisement delivery.

But Hong Jia, a researcher at ThreatBook Labs, a threat intelligence start-up based in China, told DarkReading last month that she wasn't convinced the apology was genuine -- partly because the code had stealth capabilities that went beyond what the authors claimed it did.

XCodeGhost S's stealth functions include the ability to bypass static detection tools by using character concatenation. Wei says that is making it more difficult for FireEye to find the apps infected with XCodeGhost S than the original variant. So far they've found two infected apps, but they expect to find more.

Now that this malware has been successful in cracking the Apple development environment's walls of trust, will other attackers take the same approach?

"I think it's possible, but I think it's unlikely to be the same kind of tactic," because of Apple's swift action to block that sort of attack, Wei says. Regardless of the approach, however, app developers will always be a soft target, he says.

"The alert raised by FireEye is very important," says ThreatBook Labs' Jia. "[Users] should upgrade their iOS to latest version and upgrade the infected Apps as soon as possible to avoid being hijacked, which is not a difficult thing to do by hacker."

Million-Dollar Bug Bounty

In other Apple news, intelligence contractor-slash-exploit broker Zerodium stated on Twitter that it paid out the $1 million bug bounty it promised for a remote iOS 9 exploit. The vulnerability is a browser-based jailbreak exploit.

Similar to Hacking Team, Zerodium sells zero-day vulnerabilities to government agencies to be used in offensive tools. Zerodium founder Chaouki Bekrar told The Register "We will first report the vulnerabilities to our customers, and we may later report them to Apple."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.

Published: 2017-05-09NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.